Vulnerabilities > Jenkins > Medium

DATE CVE VULNERABILITY TITLE RISK
2015-11-25 CVE-2015-5318 Cross-Site Request Forgery (CSRF) vulnerability in Jenkins
Jenkins before 1.638 and LTS before 1.625.2 uses a publicly accessible salt to generate CSRF protection tokens, which makes it easier for remote attackers to bypass the CSRF protection mechanism via a brute force attack.
6.8
2015-11-25 CVE-2015-5317 Information Exposure vulnerability in Jenkins
The Fingerprints pages in Jenkins before 1.638 and LTS before 1.625.2 might allow remote attackers to obtain sensitive job and build name information via a direct request.
network
low complexity
jenkins redhat CWE-200
5.0
2015-10-16 CVE-2015-1813 Cross-site Scripting vulnerability in Jenkins
Cross-site scripting (XSS) vulnerability in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-1812.
4.3
2015-10-16 CVE-2015-1812 Cross-site Scripting vulnerability in Jenkins
Cross-site scripting (XSS) vulnerability in Jenkins before 1.606 and LTS before 1.596.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2015-1813.
4.3
2015-10-16 CVE-2015-1810 Permissions, Privileges, and Access Controls vulnerability in multiple products
The HudsonPrivateSecurityRealm class in Jenkins before 1.600 and LTS before 1.596.1 does not restrict access to reserved names when using the "Jenkins' own user database" setting, which allows remote attackers to gain privileges by creating a reserved name.
network
high complexity
jenkins redhat CWE-264
4.6
2015-10-16 CVE-2015-1806 Permissions, Privileges, and Access Controls vulnerability in Jenkins
The combination filter Groovy script in Jenkins before 1.600 and LTS before 1.596.1 allows remote authenticated users with job configuration permission to gain privileges and execute arbitrary code on the master via unspecified vectors.
network
low complexity
jenkins redhat CWE-264
6.5
2014-10-17 CVE-2014-2066 Improper Authentication vulnerability in Jenkins
Session fixation vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to hijack web sessions via vectors involving the "override" of Jenkins cookies.
network
jenkins CWE-287
6.8
2014-10-17 CVE-2014-2065 Cross-Site Scripting vulnerability in Jenkins
Cross-site scripting (XSS) vulnerability in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to inject arbitrary web script or HTML via the iconSize cookie.
network
jenkins CWE-79
4.3
2014-10-17 CVE-2014-2064 Information Exposure vulnerability in Jenkins
The loadUserByUsername function in hudson/security/HudsonPrivateSecurityRealm.java in Jenkins before 1.551 and LTS before 1.532.2 allows remote attackers to determine whether a user exists via vectors related to failed login attempts.
network
low complexity
jenkins CWE-200
5.0
2014-10-17 CVE-2014-2062 Improper Authentication vulnerability in Jenkins
Jenkins before 1.551 and LTS before 1.532.2 does not invalidate the API token when a user is deleted, which allows remote authenticated users to retain access via the token.
network
low complexity
jenkins CWE-287
6.5